Essays about: "Förfalskningsattacker"
Found 4 essays containing the word Förfalskningsattacker.
-
1. Distributed Relay/Replay Attacks on GNSS Signals
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In modern society, Global Navigation Satellite Systems (GNSSs) are ubiquitously relied upon by many systems, among others in critical infrastructure, for navigation and time synchronization. To overcome the prevailing vulnerable state of civilian GNSSs, many detection schemes for different attack types (i.e. READ MORE
-
2. Impacts of misbehavior in Intelligent Transportation Systems (ITS) : The case of cooperative maneuvers
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Connected and autonomous vehicles are emerging technologies that have fostered the Intelligent Transportation System (ITS). ITS has the objective of optimizing traffic safety, mobility, and fuel consumption. To achieve this, a range of different services are provided that utilize communication in a vehicular network. READ MORE
-
3. VePMAD: A Vehicular Platoon Management Anomaly Detection System : A Case Study of Car-following Mode, Middle Join and Exit Maneuvers
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Vehicle communication using sensors and wireless channels plays an important role to allow exchanging information. Adding more components to allow exchanging more information with infrastructure enhanced the capabilities of vehicles and enabled the rise of Cooperative Intelligent Transport Systems (C-ITS). READ MORE
-
4. A Comparison of Smartphone GPSL1 and Galileo E1-B/C Spoofing Resilience
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Location-based services have grown in importance as smartphones, and location-based applications have become an integral part of everyday life. While Global Navigation Satellite Systems (GNSSs) provide the most accurate position determination, open service GNSS signals remain unprotected and susceptible to spoofing attacks. READ MORE